plaso-rubanetra/plaso/parsers/winreg_plugins/lfu.py
2020-04-06 18:48:34 +02:00

127 lines
4.9 KiB
Python

#!/usr/bin/python
# -*- coding: utf-8 -*-
#
# Copyright 2013 The Plaso Project Authors.
# Please see the AUTHORS file for details on individual authors.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Plug-in to collect the Less Frequently Used Keys."""
from plaso.events import windows_events
from plaso.parsers import winreg
from plaso.parsers.winreg_plugins import interface
class BootVerificationPlugin(interface.KeyPlugin):
"""Plug-in to collect the Boot Verification Key."""
NAME = 'winreg_boot_verify'
DESCRIPTION = u'Parser for Boot Verification Registry data.'
REG_TYPE = 'SYSTEM'
REG_KEYS = [u'\\{current_control_set}\\Control\\BootVerificationProgram']
URLS = ['http://technet.microsoft.com/en-us/library/cc782537(v=ws.10).aspx']
def GetEntries(
self, parser_context, key=None, registry_type=None, file_entry=None,
parser_chain=None, **unused_kwargs):
"""Gather the BootVerification key values and return one event for all.
This key is rare, so its presence is suspect.
Args:
parser_context: A parser context object (instance of ParserContext).
key: Optional Registry key (instance of winreg.WinRegKey).
The default is None.
registry_type: Optional Registry type string. The default is None.
"""
text_dict = {}
for value in key.GetValues():
text_dict[value.name] = value.data
event_object = windows_events.WindowsRegistryEvent(
key.last_written_timestamp, key.path, text_dict, offset=key.offset,
registry_type=registry_type, urls=self.URLS)
parser_context.ProduceEvent(
event_object, parser_chain=parser_chain, file_entry=file_entry)
class BootExecutePlugin(interface.KeyPlugin):
"""Plug-in to collect the BootExecute Value from the Session Manager key."""
NAME = 'winreg_boot_execute'
DESCRIPTION = u'Parser for Boot Execution Registry data.'
REG_TYPE = 'SYSTEM'
REG_KEYS = [u'\\{current_control_set}\\Control\\Session Manager']
URLS = ['http://technet.microsoft.com/en-us/library/cc963230.aspx']
def GetEntries(
self, parser_context, file_entry=None, key=None, registry_type=None,
parser_chain=None, **unused_kwargs):
"""Gather the BootExecute Value, compare to default, return event.
The rest of the values in the Session Manager key are in a separate event.
Args:
parser_context: A parser context object (instance of ParserContext).
file_entry: optional file entry object (instance of dfvfs.FileEntry).
The default is None.
key: Optional Registry key (instance of winreg.WinRegKey).
The default is None.
registry_type: Optional Registry type string. The default is None.
parser_chain: Optional string containing the parsing chain up to this
point. The default is None.
"""
text_dict = {}
for value in key.GetValues():
if value.name == 'BootExecute':
# MSDN: claims that the data type of this value is REG_BINARY
# although REG_MULTI_SZ is known to be used as well.
if value.DataIsString():
value_string = value.data
elif value.DataIsMultiString():
value_string = u''.join(value.data)
elif value.DataIsBinaryData():
value_string = value.data
else:
value_string = u''
error_string = (
u'Key: {0:s}, value: {1:s}: unsupported value data type: '
u'{2:s}.').format(key.path, value.name, value.data_type_string)
parser_context.ProduceParseError(
self.NAME, error_string, file_entry=file_entry)
# TODO: why does this have a separate event object? Remove this.
value_dict = {'BootExecute': value_string}
event_object = windows_events.WindowsRegistryEvent(
key.last_written_timestamp, key.path, value_dict, offset=key.offset,
registry_type=registry_type, urls=self.URLS)
parser_context.ProduceEvent(
event_object, parser_chain=parser_chain, file_entry=file_entry)
else:
text_dict[value.name] = value.data
event_object = windows_events.WindowsRegistryEvent(
key.last_written_timestamp, key.path, text_dict, offset=key.offset,
registry_type=registry_type, urls=self.URLS)
parser_context.ProduceEvent(
event_object, parser_chain=parser_chain, file_entry=file_entry)
winreg.WinRegistryParser.RegisterPlugins([
BootVerificationPlugin, BootExecutePlugin])